Using ATT&CK To Create
Wicked Actors in Real Data
Simeon Kakpovi
Greg Schloemer
About Us
Greg Schloemer
Vice President, KC7 Foundation
Threat Intel Analyst (Microsoft)
Simeon Kakpovi
President, KC7 Foundation
Sr Threat Intel Analyst (Microsoft)
+10 expert cybersecurity analysts,
educators, lawyers
The Problem
Access to real
intrusion data
Develop
analytical skills
How do you
break in?
Get a
cybersecurity
job
Simulated Intrusion Data: How it’s been done
Takes
weeks/months
Outdated TTPs
Static, low replay
value
The KC7 Approach
Configs built in
minutes
Model latest TTPs
New data in
seconds
Threat Intel Production Cycle++
Bringing TAs Back to Life
Using building blocks to recreate actors
Pre-built ATT&CK Techniques are building blocks for
standard adversary behavior
Putting ATT&CK in Practice
Final Result: What does XYZ technique look like?
Does it work?
Using ATT&CK to created wicked actors in real data

Using ATT&CK to created wicked actors in real data